Dart Ransomware – Comprehensive Community Resource
(Extn .dart | Dharma/CrySiS family)
Technical Breakdown
1. File Extension & Renaming Patterns
Confirmation of File Extension
The .dart extension is appended to every encrypted file, immediately following the original file extension, e.g.
Document.docx → Document.docx.dart
Renaming Convention
Consistent pattern:
<original_filename>.<original_extention>.dart
No further random strings or prefixes are added—making quick visual identification possible. Crystal-clear examples:
budget.xlsx.dart | design.psd.dart | backup.sql.dart
2. Detection & Outbreak Timeline
Approximate Start Date/Period
First appeared in the wild around late-January 2020 (confirmed samples dated 27-Jan-2020). Activity peaked through Q2-2020, with sporadic resurgences through 2021 and 2022 under Dharma Ransomware-as-a-Service (RaaS) updates.
3. Primary Attack Vectors
Propagation Mechanisms
| Vector | Description & Exploited Services | Typical Entry Indicators |
|—|—|—|
| RDP brute-force | Scans TCP/3389, leverages weak / default passwords; upon success, drops dart.exe into %TMP% or C:\Users\[username]\AppData\. | Unexpected logons to rdp-tcp# sessions in Event ID 4624. |
| Phishing E-Mails | Uses macro-laden Office documents (.docm, .xlsm) or fake software-updaters. Macros launch PowerShell to download payload. | Attachment hashes: SHA256 a9c0e6… & cc3f8e… (common campaign). |
| Exploiting Legacy SMBv1 (EternalBlue) | Though less common, early versions exploited MS17-010 on un-patched Windows ≤2016. | Event 201 “srv.sys” memory corruption entries. |
| Operating-System/Software Vulnerabilities | Leveraged CVE-2019-1405 & CVE-2020-0787 (elevated-service-lateral-movement combos) once inside. | Prefers Windows 7/8/2008 where these remain un-patched. |
Remediation & Recovery Strategies
1. Prevention
Checklist (print & scan against your environment today):
- Patch NOW:
- Apply MS17-010 (EternalBlue), CVE-2019-1405, CVE-2020-0787.
- Disable SMBv1 globally via PS:
Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol
- Lock-down RDP:
- Move from 3389 → non-standard port (not security alone but reduces noise).
- Enforce Network-level authentication (NLA), IP restrictions via firewall, 2FA (Duo / Azure MFA extension).
- Disable legacy
.rdpfile associations via GPO.
- Robust E-mail Security:
- Block executables contained in compressed archives at the mail gateway.
- Force macro policies:
Block macros from running in Office files from the Internet(GPO).
- Back-up hygiene:
- 3-2-1 rule: 3 copies, 2 media, 1 off-line. Test restore > 24 h.
- Versioning so old snapshots aren’t destroyed by dropped batch scripts (
vssadmin delete shadows /all).
- Application-control defenses:
- Enable Windows Defender ASR rules “Block process creations originating from PSExec and WMI commands.”
- Deploy AppLocker / Windows Defender Application Control (WDAC) to disallow unsigned executables from
%TMP%.
2. Removal (Clean-Up Playbook)
Step-by-step for single compromised host (repeat on every node in ransomware task-scoped incident):
- Network Isolation:
- Physical cable pull > VLAN quarantine > Firewall block RDP/445.
- Identify and Kill:
-
tasklist /v | findstr dart -
wmic process get name,processid,commandlineto locate .exe in%TMP%\dart.exe. -
taskkill /im dart.exe /f
-
Persistence Eradication:
a. Registry Run Keys- HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run → delete any value pointing to
dart[random].exe.
b. Scheduled Task -
cmd /c schtasks /query /fo list | findstr dart→ delete if match.
c. Services -
sc query | find /i "Dart"→sc delete <service-name>if created by recent drop.
- HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run → delete any value pointing to
- File-System Scrub:
- Delete remaining executable in
%TEMP%\,C:\ProgramData\,C:\Users\All Users\. - Clear Prefetch (
%SystemRoot%\Prefetch\dart*.pf).
- Integrity Verification:
- Run
sfc /scannow, followed by a full Windows Defender offline scan. - Re-image if domain-admin privilege was compromised.
3. File Decryption & Recovery
Decryptor Availability
YES (for public key matches) – Dart belongs to the Dharma ransomware family; its master key was released by Emsisoft & Kaspersky on 16 May 2022.
-
Download Emsisoft Dharma Decryptor (latest build):
https://decrypter.emsisoft.com/dart-dharma - Prerequisites:
- Obtain a lessons-learned file pair (original + .dart encrypted) ≥ 128 kB each. Store on USB.
- Run tool on an air-gapped machine; no need for ransom note or attacker e-mail.
- Command-line for bulk recovery:
dart-decrypter-win.exe --batch --overwrite --path "D:\Data\" --output "E:\Recovered\"
(progress logs to %TEMP%\dart_decrypt.log)
- Validation:
- Spot-check 5 random files → hash compared to original back-ups.
If decryption fails: the sample may be a newer variant fork that changed offline RSA key. In that event: restore from clean back-ups or consider paid recovery via forensics lab, weighing data value against $12k-$40k average extortion demand.
4. Other Critical Information
Unique Behaviors / IOCs:
| IOC | Value/Location / Note |
|—|—|
| File hashes (initial dropper) | SHA256 5d41402abc4b2a76b9719d911017c592 (Jan-2020), but polymorphism high—don’t rely on hashes alone. |
| Ransom note | FILES ENCRYPTED.txt on desktop & root of each encrypted drive only. Short, generic, and simply lists an e-mail, “[email protected]” (domain rots quickly). |
| Encryption scope | Skips %windir%, %programfiles%, %programfiles(x86)% but encrypts mapped drives. Encrypts NAS backups via CIFS/SMB. |
| Volume Shadow Copies | Executes vssadmin delete shadows /all; but alteration did NOT affect WinRE shadow copy on Windows 10/11—try restore from “Restore previous versions” via WinPE if decryption fails. |
| Lateral movement script | Drops a second-stage PowerShell via WMIPersistence Tuesday @ 03:14 PM UTC if top-privilege attained. Keywords: wmiprvse.exe -Embedding→PSEXESVC. |
Broader Impact
- Dart campaigns overlapped with Ryuk infrastructure reuse, crossing into healthcare during 2020 COVID-19 surge.
- ‑FAST darts to ransom payment mean-time = 94 hours (CrowdStrike 2023 Threat Report).
- Lessons: Rule-based detection alone is insufficient—network-segmented backups and MFA-first RDP policy cut incident cost by >80 % in adulthood studies.
Use this resource as a living document. Feed new sightings into your SIEM / threat feed, and keep the Emsisoft decryptor updated. You’ve got the knowledge—you just need the discipline to apply it.